1. All the following are examples of real security and privacy risks except
a) hackers
b) spam
c) viruses
d) identity theft
e) None of these
2. A(n) ________ system is a small, wireless handheld computer that scans items, tags and pulls up the current price (and any special offer) as you shop.
a) PSS
b) POS
c) Inventory
d) Data mining
e) None of these
3. Which of the following is NOT one of the four major data processing functions of a computer?
a) Gathering data
b) Processing data into information
c) Analysing the data or information
d) Storing the data or information
e) None of these
4. A proxy server is used for which of the following?
a) To provide security against unauthorised users
b) To process client requests for Web pages
c) To process client requests for database access
d) To provide TCP/IP
e) None of these
5. All the logical and mathematical calculations done by the computer happen in/on the
a) system board
b) central control unit
c) central processing unit
d) mother board
e) memory
6. A ________ contains buttons and menus that provide quick access to commonly used commands.
a) menu bar
b) tool bar
c) window
d) find
e) None of these
7. Letters, numbers and symbols found on a keyboard are
a) icons
b) screen
c) keys
d) menu
e) None of these
8. Which is not an item of hardware?
a) An MP3 file
b) A keyboard
c) A disk drive
d) A monitor
e) None of these
9. You click at B to make the text
a) italics
b) underlined
c) italics and underlined
d) bold
e) None of these
10. ________ is the process of finding errors in software code.
a) Debugging
b) Compiling
c) Interpreting
d) Testing
e) None of these
Answers:
1. b) spam2. a) PSS3. c) Analysing the data or information4. a) To provide security against unauthorised users5. e) memory6. b) tool bar7. c) keys8. a) An MP3 file9. d) bold10. d) Testing
Thanks.